First published: Mon Jan 16 2017(Updated: )
It was discovered that the URLClassLoader class in the Networking component of OpenJDK did not properly check access control context when downloading class files. An untrusted Java application or applet could use this flaw to make HTTP requests to locations that should not be accessible, bypassing certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6-update_131 | |
Oracle JDK 6 | =1.7-update_121 | |
Oracle JDK 6 | =1.8-update_111 | |
Oracle JDK 6 | =1.8-update_112 | |
Oracle Java Runtime Environment (JRE) | =1.6-update_131 | |
Oracle Java Runtime Environment (JRE) | =1.7-update_121 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_111 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_112 | |
debian/openjdk-8 | 8u442-ga-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3231 is classified as a moderate severity vulnerability.
To remediate CVE-2017-3231, update to the latest version of OpenJDK or Oracle JDK that includes the fix, such as OpenJDK 8u442.
CVE-2017-3231 affects Oracle JDK and JRE versions 1.6 update 131, 1.7 update 121, and 1.8 updates 111 and 112.
The risk of CVE-2017-3231 is that an untrusted Java application could exploit this vulnerability to bypass access controls and make unauthorized HTTP requests.
Developers and organizations using affected versions of Oracle JDK and JRE are impacted by CVE-2017-3231.